Loading…

Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System

As the great prevalence of various Internet of Things (IoT) terminals, how to solve the problem of isolated information among different IoT platforms attracts attention from both academia and industry. It is necessary to establish a trusted access system to achieve secure authentication and collabor...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on industrial informatics 2020-03, Vol.16 (3), p.1972-1983
Main Authors: Guo, Shaoyong, Hu, Xing, Guo, Song, Qiu, Xuesong, Qi, Feng
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c291t-a0f40c382e0e7aa35db60f09947446b27fecfb6ac6002b7b82a9bc129b7950ce3
cites cdi_FETCH-LOGICAL-c291t-a0f40c382e0e7aa35db60f09947446b27fecfb6ac6002b7b82a9bc129b7950ce3
container_end_page 1983
container_issue 3
container_start_page 1972
container_title IEEE transactions on industrial informatics
container_volume 16
creator Guo, Shaoyong
Hu, Xing
Guo, Song
Qiu, Xuesong
Qi, Feng
description As the great prevalence of various Internet of Things (IoT) terminals, how to solve the problem of isolated information among different IoT platforms attracts attention from both academia and industry. It is necessary to establish a trusted access system to achieve secure authentication and collaborative sharing. Therefore, this article proposes a distributed and trusted authentication system based on blockchain and edge computing, aiming to improve authentication efficiency. This system consists of physical network layer, blockchain edge layer and blockchain network layer. Through the blockchain network, an optimized practical Byzantine fault tolerance consensus algorithm is designed to construct a consortium blockchain for storing authentication data and logs. It guarantees trusted authentication and achieves activity traceability of terminals. Furthermore, edge computing is applied in blockchain edge nodes, to provide name resolution and edge authentication service based on smart contracts. Meanwhile, an asymmetric cryptography is designed, to prevent connection between nodes and terminals from being attacked. And a caching strategy based on edge computing is proposed to improve hit ratio. Our proposed authentication mechanism is evaluated with respect to communication and computation costs. Simulation results show that the caching strategy outperforms existing edge computing strategies by 6%-12% in terms of average delay, and 8%-14% in hit ratio.
doi_str_mv 10.1109/TII.2019.2938001
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TII_2019_2938001</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8818339</ieee_id><sourcerecordid>2345522623</sourcerecordid><originalsourceid>FETCH-LOGICAL-c291t-a0f40c382e0e7aa35db60f09947446b27fecfb6ac6002b7b82a9bc129b7950ce3</originalsourceid><addsrcrecordid>eNo9kE1LAzEQhoMoWKt3wUvA89ZJsl_xVmvVQkXBeg5JdrZNbXdrkj3037ulxdO8DM87Aw8htwxGjIF8WMxmIw5MjrgUJQA7IwMmU5YAZHDe5yxjieAgLslVCGsAUYCQA_L5tGntj11p19B3xBjotFoinbTbXRdds3ykY_rsQvTOdBErqpuKLnwXDnncxRU20VkdXdvQr32_3V6Ti1pvAt6c5pB8v0wXk7dk_vE6m4znieWSxURDnYIVJUfAQmuRVSaHGqRMizTNDS9qtLXJtc0BuClMybU0lnFpCpmBRTEk98e7O9_-dhiiWredb_qXios0yzjPuegpOFLWtyF4rNXOu632e8VAHbyp3ps6eFMnb33l7lhxiPiPlyUrhZDiD_oaaMQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2345522623</pqid></control><display><type>article</type><title>Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System</title><source>IEEE Xplore (Online service)</source><creator>Guo, Shaoyong ; Hu, Xing ; Guo, Song ; Qiu, Xuesong ; Qi, Feng</creator><creatorcontrib>Guo, Shaoyong ; Hu, Xing ; Guo, Song ; Qiu, Xuesong ; Qi, Feng</creatorcontrib><description>As the great prevalence of various Internet of Things (IoT) terminals, how to solve the problem of isolated information among different IoT platforms attracts attention from both academia and industry. It is necessary to establish a trusted access system to achieve secure authentication and collaborative sharing. Therefore, this article proposes a distributed and trusted authentication system based on blockchain and edge computing, aiming to improve authentication efficiency. This system consists of physical network layer, blockchain edge layer and blockchain network layer. Through the blockchain network, an optimized practical Byzantine fault tolerance consensus algorithm is designed to construct a consortium blockchain for storing authentication data and logs. It guarantees trusted authentication and achieves activity traceability of terminals. Furthermore, edge computing is applied in blockchain edge nodes, to provide name resolution and edge authentication service based on smart contracts. Meanwhile, an asymmetric cryptography is designed, to prevent connection between nodes and terminals from being attacked. And a caching strategy based on edge computing is proposed to improve hit ratio. Our proposed authentication mechanism is evaluated with respect to communication and computation costs. Simulation results show that the caching strategy outperforms existing edge computing strategies by 6%-12% in terms of average delay, and 8%-14% in hit ratio.</description><identifier>ISSN: 1551-3203</identifier><identifier>EISSN: 1941-0050</identifier><identifier>DOI: 10.1109/TII.2019.2938001</identifier><identifier>CODEN: ITIICH</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; Authentication ; Blockchain ; Caching ; caching strategy ; Cloud computing ; Computer simulation ; Consortia ; Cryptography ; Edge computing ; Fault tolerance ; Internet of Things ; Internet of Things (IoT) ; Nodes ; Peer-to-peer computing ; Terminals ; trusted authentication</subject><ispartof>IEEE transactions on industrial informatics, 2020-03, Vol.16 (3), p.1972-1983</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c291t-a0f40c382e0e7aa35db60f09947446b27fecfb6ac6002b7b82a9bc129b7950ce3</citedby><cites>FETCH-LOGICAL-c291t-a0f40c382e0e7aa35db60f09947446b27fecfb6ac6002b7b82a9bc129b7950ce3</cites><orcidid>0000-0003-2481-8774 ; 0000-0002-5706-1483 ; 0000-0002-7899-539X ; 0000-0001-9831-2202 ; 0000-0003-2033-8431</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8818339$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Guo, Shaoyong</creatorcontrib><creatorcontrib>Hu, Xing</creatorcontrib><creatorcontrib>Guo, Song</creatorcontrib><creatorcontrib>Qiu, Xuesong</creatorcontrib><creatorcontrib>Qi, Feng</creatorcontrib><title>Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System</title><title>IEEE transactions on industrial informatics</title><addtitle>TII</addtitle><description>As the great prevalence of various Internet of Things (IoT) terminals, how to solve the problem of isolated information among different IoT platforms attracts attention from both academia and industry. It is necessary to establish a trusted access system to achieve secure authentication and collaborative sharing. Therefore, this article proposes a distributed and trusted authentication system based on blockchain and edge computing, aiming to improve authentication efficiency. This system consists of physical network layer, blockchain edge layer and blockchain network layer. Through the blockchain network, an optimized practical Byzantine fault tolerance consensus algorithm is designed to construct a consortium blockchain for storing authentication data and logs. It guarantees trusted authentication and achieves activity traceability of terminals. Furthermore, edge computing is applied in blockchain edge nodes, to provide name resolution and edge authentication service based on smart contracts. Meanwhile, an asymmetric cryptography is designed, to prevent connection between nodes and terminals from being attacked. And a caching strategy based on edge computing is proposed to improve hit ratio. Our proposed authentication mechanism is evaluated with respect to communication and computation costs. Simulation results show that the caching strategy outperforms existing edge computing strategies by 6%-12% in terms of average delay, and 8%-14% in hit ratio.</description><subject>Algorithms</subject><subject>Authentication</subject><subject>Blockchain</subject><subject>Caching</subject><subject>caching strategy</subject><subject>Cloud computing</subject><subject>Computer simulation</subject><subject>Consortia</subject><subject>Cryptography</subject><subject>Edge computing</subject><subject>Fault tolerance</subject><subject>Internet of Things</subject><subject>Internet of Things (IoT)</subject><subject>Nodes</subject><subject>Peer-to-peer computing</subject><subject>Terminals</subject><subject>trusted authentication</subject><issn>1551-3203</issn><issn>1941-0050</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNo9kE1LAzEQhoMoWKt3wUvA89ZJsl_xVmvVQkXBeg5JdrZNbXdrkj3037ulxdO8DM87Aw8htwxGjIF8WMxmIw5MjrgUJQA7IwMmU5YAZHDe5yxjieAgLslVCGsAUYCQA_L5tGntj11p19B3xBjotFoinbTbXRdds3ykY_rsQvTOdBErqpuKLnwXDnncxRU20VkdXdvQr32_3V6Ti1pvAt6c5pB8v0wXk7dk_vE6m4znieWSxURDnYIVJUfAQmuRVSaHGqRMizTNDS9qtLXJtc0BuClMybU0lnFpCpmBRTEk98e7O9_-dhiiWredb_qXios0yzjPuegpOFLWtyF4rNXOu632e8VAHbyp3ps6eFMnb33l7lhxiPiPlyUrhZDiD_oaaMQ</recordid><startdate>20200301</startdate><enddate>20200301</enddate><creator>Guo, Shaoyong</creator><creator>Hu, Xing</creator><creator>Guo, Song</creator><creator>Qiu, Xuesong</creator><creator>Qi, Feng</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-2481-8774</orcidid><orcidid>https://orcid.org/0000-0002-5706-1483</orcidid><orcidid>https://orcid.org/0000-0002-7899-539X</orcidid><orcidid>https://orcid.org/0000-0001-9831-2202</orcidid><orcidid>https://orcid.org/0000-0003-2033-8431</orcidid></search><sort><creationdate>20200301</creationdate><title>Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System</title><author>Guo, Shaoyong ; Hu, Xing ; Guo, Song ; Qiu, Xuesong ; Qi, Feng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c291t-a0f40c382e0e7aa35db60f09947446b27fecfb6ac6002b7b82a9bc129b7950ce3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Authentication</topic><topic>Blockchain</topic><topic>Caching</topic><topic>caching strategy</topic><topic>Cloud computing</topic><topic>Computer simulation</topic><topic>Consortia</topic><topic>Cryptography</topic><topic>Edge computing</topic><topic>Fault tolerance</topic><topic>Internet of Things</topic><topic>Internet of Things (IoT)</topic><topic>Nodes</topic><topic>Peer-to-peer computing</topic><topic>Terminals</topic><topic>trusted authentication</topic><toplevel>online_resources</toplevel><creatorcontrib>Guo, Shaoyong</creatorcontrib><creatorcontrib>Hu, Xing</creatorcontrib><creatorcontrib>Guo, Song</creatorcontrib><creatorcontrib>Qiu, Xuesong</creatorcontrib><creatorcontrib>Qi, Feng</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore (Online service)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on industrial informatics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Guo, Shaoyong</au><au>Hu, Xing</au><au>Guo, Song</au><au>Qiu, Xuesong</au><au>Qi, Feng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System</atitle><jtitle>IEEE transactions on industrial informatics</jtitle><stitle>TII</stitle><date>2020-03-01</date><risdate>2020</risdate><volume>16</volume><issue>3</issue><spage>1972</spage><epage>1983</epage><pages>1972-1983</pages><issn>1551-3203</issn><eissn>1941-0050</eissn><coden>ITIICH</coden><abstract>As the great prevalence of various Internet of Things (IoT) terminals, how to solve the problem of isolated information among different IoT platforms attracts attention from both academia and industry. It is necessary to establish a trusted access system to achieve secure authentication and collaborative sharing. Therefore, this article proposes a distributed and trusted authentication system based on blockchain and edge computing, aiming to improve authentication efficiency. This system consists of physical network layer, blockchain edge layer and blockchain network layer. Through the blockchain network, an optimized practical Byzantine fault tolerance consensus algorithm is designed to construct a consortium blockchain for storing authentication data and logs. It guarantees trusted authentication and achieves activity traceability of terminals. Furthermore, edge computing is applied in blockchain edge nodes, to provide name resolution and edge authentication service based on smart contracts. Meanwhile, an asymmetric cryptography is designed, to prevent connection between nodes and terminals from being attacked. And a caching strategy based on edge computing is proposed to improve hit ratio. Our proposed authentication mechanism is evaluated with respect to communication and computation costs. Simulation results show that the caching strategy outperforms existing edge computing strategies by 6%-12% in terms of average delay, and 8%-14% in hit ratio.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/TII.2019.2938001</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0003-2481-8774</orcidid><orcidid>https://orcid.org/0000-0002-5706-1483</orcidid><orcidid>https://orcid.org/0000-0002-7899-539X</orcidid><orcidid>https://orcid.org/0000-0001-9831-2202</orcidid><orcidid>https://orcid.org/0000-0003-2033-8431</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1551-3203
ispartof IEEE transactions on industrial informatics, 2020-03, Vol.16 (3), p.1972-1983
issn 1551-3203
1941-0050
language eng
recordid cdi_crossref_primary_10_1109_TII_2019_2938001
source IEEE Xplore (Online service)
subjects Algorithms
Authentication
Blockchain
Caching
caching strategy
Cloud computing
Computer simulation
Consortia
Cryptography
Edge computing
Fault tolerance
Internet of Things
Internet of Things (IoT)
Nodes
Peer-to-peer computing
Terminals
trusted authentication
title Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T19%3A53%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Blockchain%20Meets%20Edge%20Computing:%20A%20Distributed%20and%20Trusted%20Authentication%20System&rft.jtitle=IEEE%20transactions%20on%20industrial%20informatics&rft.au=Guo,%20Shaoyong&rft.date=2020-03-01&rft.volume=16&rft.issue=3&rft.spage=1972&rft.epage=1983&rft.pages=1972-1983&rft.issn=1551-3203&rft.eissn=1941-0050&rft.coden=ITIICH&rft_id=info:doi/10.1109/TII.2019.2938001&rft_dat=%3Cproquest_cross%3E2345522623%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c291t-a0f40c382e0e7aa35db60f09947446b27fecfb6ac6002b7b82a9bc129b7950ce3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2345522623&rft_id=info:pmid/&rft_ieee_id=8818339&rfr_iscdi=true